GitHub监控消息提醒!!!
更新了:CVE-2023
描述:A actively exploiting a zero-day vulnerability in the MOVEit Transfer file transfer software, tracked as CVE-2023-34362, to steal data from organizations.
URL:https://github.com/CyberKendra/MoveIt-Victims-List
标签:#CVE-2023
更新了:CVE-2023
描述:A actively exploiting a zero-day vulnerability in the MOVEit Transfer file transfer software, tracked as CVE-2023-34362, to steal data from organizations.
URL:https://github.com/CyberKendra/MoveIt-Victims-List
标签:#CVE-2023
GitHub监控消息提醒!!!
更新了:Red Team
描述:🔴👩💻 This repository is designed to provide a simplified approach to understanding 🔴♔Red Team♔🔴
URL:https://github.com/arharif/Red-Teaming
标签:#Red Team
更新了:Red Team
描述:🔴👩💻 This repository is designed to provide a simplified approach to understanding 🔴♔Red Team♔🔴
URL:https://github.com/arharif/Red-Teaming
标签:#Red Team
GitHub监控消息提醒!!!
更新了:Red Team
描述:Programs I wrote for Red Teaming
URL:https://github.com/w01verine/Red-Teaming
标签:#Red Team
更新了:Red Team
描述:Programs I wrote for Red Teaming
URL:https://github.com/w01verine/Red-Teaming
标签:#Red Team
GitHub
GitHub - w01verine/Red-Teaming: Programs I wrote for Red Teaming
Programs I wrote for Red Teaming. Contribute to w01verine/Red-Teaming development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Initial access for Red Team
URL:https://github.com/hegusung/Windows-Initial-Access
标签:#Red Team
更新了:Red Team
描述:Initial access for Red Team
URL:https://github.com/hegusung/Windows-Initial-Access
标签:#Red Team
GitHub
GitHub - hegusung/Windows-Initial-Access: Initial access for Red Team
Initial access for Red Team. Contribute to hegusung/Windows-Initial-Access development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:免杀
描述:平台:Windows/Mac/Linux。涉及:桌面基线排查、软件激活破解、免杀及特权执行、主机安全加固、人文社科信息数据分析等。
URL:https://github.com/hoochanlon/ihs-simple
标签:#免杀
更新了:免杀
描述:平台:Windows/Mac/Linux。涉及:桌面基线排查、软件激活破解、免杀及特权执行、主机安全加固、人文社科信息数据分析等。
URL:https://github.com/hoochanlon/ihs-simple
标签:#免杀
GitHub
GitHub - hoochanlon/scripts: 平台:Windows/Mac/Linux。脚本语言:多种、不限;我流,按需编写。涉及:桌面基线排查、软件激活破解、免杀及特权执行、渗透式支援固件识别读写、主机账户密码空值检测、Wi-Fi密码扫描…
平台:Windows/Mac/Linux。脚本语言:多种、不限;我流,按需编写。涉及:桌面基线排查、软件激活破解、免杀及特权执行、渗透式支援固件识别读写、主机账户密码空值检测、Wi-Fi密码扫描、云主机终端安全加固、主机系统日志分析、自然语言处理、人文社科信息数据分析等。 - GitHub - hoochanlon/scripts: 平台:Windows/Mac/Linux。脚本语言:多种、...
GitHub监控消息提醒!!!
更新了:反序列化
描述:MySQL Fake Server (纯Java实现,内置常见Java反序列化Payload,支持GUI版和命令行版,提供Dockerfile)
URL:https://github.com/4ra1n/mysql-fake-server
标签:#反序列化
更新了:反序列化
描述:MySQL Fake Server (纯Java实现,内置常见Java反序列化Payload,支持GUI版和命令行版,提供Dockerfile)
URL:https://github.com/4ra1n/mysql-fake-server
标签:#反序列化
GitHub
GitHub - 4ra1n/mysql-fake-server: 纯 Java 实现的 MySQL Fake Server | 支持 GUI 版和命令行版 | 支持反序列化和文件读取的利用方式 | 支持常见的 GADGET 和自定义 GADGET 数据…
纯 Java 实现的 MySQL Fake Server | 支持 GUI 版和命令行版 | 支持反序列化和文件读取的利用方式 | 支持常见的 GADGET 和自定义 GADGET 数据 | 根据目标环境自动生成匹配的 PAYLOAD | 支持 PGSQL 和 DERBY 的利用 - GitHub - 4ra1n/mysql-fake-server: 纯 Java 实现的 MySQL Fa...
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:GeoServer & GeoTools SQL Injection (CVE-2023-25157 & CVE-2023-25158)
URL:https://github.com/murataydemir/CVE-2023-25157-and-CVE-2023-25158
标签:#CVE-2023
更新了:CVE-2023
描述:GeoServer & GeoTools SQL Injection (CVE-2023-25157 & CVE-2023-25158)
URL:https://github.com/murataydemir/CVE-2023-25157-and-CVE-2023-25158
标签:#CVE-2023
GitHub
GitHub - murataydemir/CVE-2023-25157-and-CVE-2023-25158: GeoServer & GeoTools SQL Injection (CVE-2023-25157 & CVE-2023-25158)
GeoServer & GeoTools SQL Injection (CVE-2023-25157 & CVE-2023-25158) - murataydemir/CVE-2023-25157-and-CVE-2023-25158
GitHub监控消息提醒!!!
更新了:绕过
描述:自动更新获取常用域名服务的即时IP,可以配合SwitchHosts进行一键修改。这样可以绕过相关限制,以及省去DNS查询解析。
URL:https://github.com/NgxuAnGMH/github-DNS
标签:#绕过
更新了:绕过
描述:自动更新获取常用域名服务的即时IP,可以配合SwitchHosts进行一键修改。这样可以绕过相关限制,以及省去DNS查询解析。
URL:https://github.com/NgxuAnGMH/github-DNS
标签:#绕过
GitHub
GitHub - NgxuAnGMH/github-DNS: 自动更新获取常用域名服务的即时IP,可以配合SwitchHosts进行一键修改。这样可以绕过相关限制,以及省去DNS查询解析。
自动更新获取常用域名服务的即时IP,可以配合SwitchHosts进行一键修改。这样可以绕过相关限制,以及省去DNS查询解析。 - NgxuAnGMH/github-DNS
GitHub监控消息提醒!!!
更新了:Red Team
描述:Tools & TTP's for Active Directory Red Teaming
URL:https://github.com/samay825/Wp-Lk-Sincrypt
标签:#Red Team
更新了:Red Team
描述:Tools & TTP's for Active Directory Red Teaming
URL:https://github.com/samay825/Wp-Lk-Sincrypt
标签:#Red Team
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CSV File Containing CVE-2023-34362 IOCs
URL:https://github.com/lithuanian-g/cve-2023-34362-iocs
标签:#CVE-2023
更新了:CVE-2023
描述:CSV File Containing CVE-2023-34362 IOCs
URL:https://github.com/lithuanian-g/cve-2023-34362-iocs
标签:#CVE-2023
GitHub
GitHub - lithuanian-g/cve-2023-34362-iocs: CSV File Containing CVE-2023-34362 IOCs
CSV File Containing CVE-2023-34362 IOCs. Contribute to lithuanian-g/cve-2023-34362-iocs development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)
URL:https://github.com/Chal13W1zz/BadParcel
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)
URL:https://github.com/Chal13W1zz/BadParcel
标签:#CVE-2023
GitHub
GitHub - pwnipc/BadParcel: CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch)
CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch) - pwnipc/BadParcel
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:MOVEit CVE-2023-34362
URL:https://github.com/horizon3ai/CVE-2023-34362
标签:#CVE-2023
更新了:CVE-2023
描述:MOVEit CVE-2023-34362
URL:https://github.com/horizon3ai/CVE-2023-34362
标签:#CVE-2023
GitHub
GitHub - horizon3ai/CVE-2023-34362: MOVEit CVE-2023-34362
MOVEit CVE-2023-34362. Contribute to horizon3ai/CVE-2023-34362 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:MOVEit CVE-2023-34362
URL:https://github.com/happy0717/CVE-2023-34965
标签:#CVE-2023
更新了:CVE-2023
描述:MOVEit CVE-2023-34362
URL:https://github.com/happy0717/CVE-2023-34965
标签:#CVE-2023
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:MOVEit CVE-2023-34362
URL:https://github.com/AgentY0/CVE-2023-34965
标签:#CVE-2023
更新了:CVE-2023
描述:MOVEit CVE-2023-34362
URL:https://github.com/AgentY0/CVE-2023-34965
标签:#CVE-2023
GitHub
GitHub - AgentY0/CVE-2023-34965: SSPanel UIM is a multi-purpose agency service sales management system specially designed for Shadowsocks…
SSPanel UIM is a multi-purpose agency service sales management system specially designed for Shadowsocks / V2Ray / Trojan protocols. SSPanel-Uim version before 2023.3 does not restrict access to th...
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-34362: MOVEit Transfer Unauthenticated RCE
URL:https://github.com/sfewer-r7/CVE-2023-34362
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-34362: MOVEit Transfer Unauthenticated RCE
URL:https://github.com/sfewer-r7/CVE-2023-34362
标签:#CVE-2023
GitHub
GitHub - sfewer-r7/CVE-2023-34362: CVE-2023-34362: MOVEit Transfer Unauthenticated RCE
CVE-2023-34362: MOVEit Transfer Unauthenticated RCE - sfewer-r7/CVE-2023-34362
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:A script, written in golang. POC for CVE-2023-25157
URL:https://github.com/7imbitz/CVE-2023-25157-checker
标签:#CVE-2023
更新了:CVE-2023
描述:A script, written in golang. POC for CVE-2023-25157
URL:https://github.com/7imbitz/CVE-2023-25157-checker
标签:#CVE-2023
GitHub
GitHub - 7imbitz/CVE-2023-25157-checker: A script, written in golang. POC for CVE-2023-25157
A script, written in golang. POC for CVE-2023-25157 - 7imbitz/CVE-2023-25157-checker
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Proof of concept code for CVE-2023-2008
URL:https://github.com/bluefrostsecurity/CVE-2023-2008
标签:#CVE-2023
更新了:CVE-2023
描述:Proof of concept code for CVE-2023-2008
URL:https://github.com/bluefrostsecurity/CVE-2023-2008
标签:#CVE-2023
GitHub
GitHub - bluefrostsecurity/CVE-2023-2008: Proof of concept code for CVE-2023-2008
Proof of concept code for CVE-2023-2008. Contribute to bluefrostsecurity/CVE-2023-2008 development by creating an account on GitHub.